Protection / Preservation of Corporate Assets and Information

Companies have many assets. In conducting our business, we use a huge range of such assets, including not only our own corporate assets, but also customers' personal information and many kinds of tangible and intangible assets entrusted to us via contracts with our business partners. We must protect both our own property and the property rights of these third parties. In the course of our day-to-day work, it is becoming increasingly important to take care in dealing with assets we handle and to think and act in ways that will protect them.

1. Effective use of corporate assets

To deliver products that feature leading-edge, proprietary technologies, we actively and effectively use our corporate assets, which are a key management resource.

2. Prohibition of conflicts of interest

We do not act in ways that place our own personal gain or the gain of family, friends or acquaintances above the interests of the company. For example, we do not compete with the business of the company, involve ourselves in such competitive business or work in the interests of competitors.

3. Prohibition of improper use of corporate assets

We appropriately manage and use tangible and intangible corporate assets such as products, facilities, equipment, information and intellectual property. We neither use them for personal gain or any other improper purpose, nor act in any way that might damage or devalue them.

4. Protection of confidential information

Always mindful that corporate confidential information is an important corporate asset, we manage it with rigorous care and maintain confidentiality.

5. Protection of others' intellectual property

We do not improperly acquire or utilize non-public information belonging to others. Nor do we infringe on others' intellectual property rights, such as copyrights or patent rights.

6. Protection of personal information

Recognizing the importance of personal information, we handle it appropriately in accordance with the prescribed rules for gathering, recording, managing, using and disposing of such information.